Re: The Cypherpunk's 1995 Archive has been forged, and what are we going to do about it? (was:Re: Could someone add news of Cypherpunks Archive...

2019-11-23 Thread jim bell
 Did you see this recent upload from me:
jim bell To:CypherPunks
Nov 22 at 11:54 PM
Judge Says The FBI Can't Keep Refusing To Confirm Or Deny The Existence Of 
Social Media Monitoring Documents

How will this affect FOIA applications on Cypherpunks 
data?
That is a case out of the Northern District of California.  
https://en.wikipedia.org/wiki/United_States_District_Court_for_the_Northern_District_of_California
   
  I haven't read it in detail yet.  It deals with monitoring "social media".  
While the term "social media" didn't exist in 1995, it is likely that the 
Cypherpunks email list is close enough to that to qualify.   To take advantage 
of that, we could find somebody in that judicial district who is willing to 
file a FOIA there.  
I will respond further to your email soon, probably by tomorrow morning.
                     Jim Bell 



On Saturday, November 23, 2019, 07:06:44 PM PST, Douglas Lucas 
 wrote:  
 
 Via MuckRock I've filed nearly 100 requests:
https://www.muckrock.com/accounts/profile/douglaslucas/

Several of my requests have returned documents, and a few have formed
the basis of articles by me, e.g this one regarding our gentlehearted
friends at Stratfor --
https://web.archive.org/web/20160414073752/https://revolution-news.com/stratfor-wheres-truck/
-- or this one involving our scholarly friends at the Border Security
Operations Center in Texas
https://whowhatwhy.org/2014/07/16/exclusive-the-counterinsurgency-war-on-and-inside-our-borders/

Because corporations have a few times repeated me in watered down form,
i.e. because Vice and Salon have published me, echolalia or whatever, I
usually have success in getting agencies to waive or minimize fees,
saying the usual stuff about muh journalismszz. Not always though. A
while back, I asked the Texas state police for certain Stratfor g00dz
and they wanted a zillion dollars or something.

In the next 24-48 hours I'm working on a bunch of other FOIA requests,
including appeals... so I could send requests regarding Cypherpunks off
as well, if the list clarifies what agencies/offices are wanted.

Because, what agencies do you suspect might have long ago collections of
Cypherpunk emails? FOIAs have to go somewhere, to some agency or office.
Where, Jim and others, were y'all thinking of submitting FOIAs?

As far as I know, the raw data vacuumed up by federal spy agencies
haven't and won't be handed out to the public via FOIA. They'll cite any
one of multiple exceptions. I assume, but do not know for certain, that
other people have tried such open records requests for laughs, like
"From the NSA, I hereby request my photos I accidentally deleted back, I
emailed them to myself 10 years ago, does Joseph Maguire at the ODNI
have a copy please?"

It might be good to limit the request to the time frame from and
including 1 Jan 1995 to and including 31 Dec 1996, because the smaller
the scope of the request, the slightly less likely it is that the
gub'ment will delay forever, charge fees, say they don't have anything,
use some exception, ignore me much like my crushes, etc.

As I suggested above, I think it would be difficult/impossible to obtain
cypherpunk emails through FOIA from some agency's covert or clandestine
or otherwise shady program or other. Agencies usually use exceptions to
block such requests.

However, I wonder if there were any overt programs, agencies, offices,
bureaus, whatever that happened to keep an archive of the cypherpunks
email list. Maybe some program was liaising with a university for some
reason regarding computer-y internet-y technical crap. And that program
housed a bunch of email lists for scientific or advertising or
educational purposes.

In other words, don't think spies and covert shit. Maybe there's some
really overt, goofy program from back then that collected cypherpunks
emails as part of some straightforward educational or scientific or some
other mundane thing...?

Also, regarding to which agencies these open record requests shoudl go,
don't just limit imagination to the federal government. Many
agencies/offices/bureaus/etc. at the state, local, county, and other
levels of government will take open records requests as well.

Doug


On 2019-11-22 21:35, jim bell wrote:
> To Ryan Carboni,
> It looks like you are familiar with the practice of writing and filing
> Freedom of Information Act requests. 
> https://www.muckrock.com/accounts/profile/ryaz/  
> 
> Given that these requests can take a long time, I think it would be
> appropriate to make such a filing for any Cyperpunks mailing list
> emails, especially but not limited to those from 1995-1996.   Naturally,
> we will want the output on a computer readable format, such as writable
> CD, writable DVD, or some other downloadable file system.
> 
>   We will probably want to compare these emails from those that will be
> obtained by other sources.   What do you think?   Would you help this
> process?  Can you write the FOIA request

Soros fights back - demands unconditional censorship by Fox and other MSM - [PEACE]

2019-11-23 Thread Zenaan Harkness
Finally a little fighting spirit from George Soros :)

  DiGenova Calls Out Soros’ Control Over State Department and FBI
  
https://theduran.com/digenova-calls-out-soros-control-over-state-department-and-fbi/

The Open Society and Anti-Defamation League have gone ballistic
last week demanding for the unprecedented eternal banning of Joe
diGenova from Fox News… or else.

DiGenova (former Federal Attorney for the District of Columbia)
committed a grievous crime indeed, calling out the unspeakable
“philanthropist” George Soros on Fox News’ Lou Dobbs Show on Nov.
14 as a force controlling a major portion of the American State
Department and FBI. To be specific, DiGenova stated: “no doubt
that George Soros controls a very large part of the career
foreign service of the United States State Department. He also
controls the activities of FBI agents overseas who work for NGOs
— work with NGOs. That was very evident in Ukraine. And Kent was
part of that. He was a very big protector of Soros.” DiGenova was
here referencing  State Department head George Kent who’s
testimony is being used to advance President Trump’s impeachment.

...
As has been extensively documented in many locations,

https://larouchepub.com/eiw/public/2008/eirv35n26-20080704/eirv35n26-20080704_064-your_enemy_george_soros-dossier.pdf
ever since young Soros’ talents were identified as a young boy
working for the Nazis during WWII (a time he describes as the
best and most formative of his life), this young sociopath was
recruited to the managerial class of the empire becoming a
disciple of the “Open Society” post-nation state theories of Karl
Popper while a student in London. He latter became one of the
first hedge fund managers with startup capital provided by Evelyn
Rothschild in 1968 and rose in prominence as a pirate of
globalization, assigned at various times to unleash speculative
attacks on nations resisting the world government agenda pushed
by his masters (in some cases even attacking the center of power-
London itself in 1992 which provided an excuse for the London
oligarchs to stay out of the very euro trap that they
orchestrated for other European nations to walk into).

...
After the Y2K bubble, Soros began devoting larger parts of his
resources to international drug legalization, euthanasia
lobbying, color revolutions and other regime change programs
under the guise of “Human Rights” organizations which have done a
remarkable job destroying the sovereignty of Sudan, Libya, Iraq,
and Syria to name a few. Since the economic crisis of 2008-09
(which his speculation helped create through unbounded currency
and derivatives speculation), Soros has begun to advocate a new
world governance system centred on what has recently been called
the “Green New Deal” which has less to do with saving nature, and
everything to do with depopulation.

So when the ADL, and Open Society attacks someone for being
anti-semitic, you know that whomever they are attacking are
probably doing something useful.

Matthew Ehret is the founder of the Canadian Patriot Review and
Director of the Rising Tide Foundation. He has authored three
volumes of the Untold History of Canada, and can be reached at
[email protected]


Never going to prosecuted

2019-11-23 Thread Ryan Carboni
https://en.wikipedia.org/wiki/Al-Haramain_Foundation#Al-Haramain_suit

>Three individuals whose conversations were intercepted, Suliman al-Buthe,
>Wendell Belew and Asim Ghafoor, learned of the eavesdropping when U.S.
>officials accidentally delivered logs of phone calls to them.

I'm never going to be prosecuted, it is unrealistic to assume so, and
I have serious doubts that this investigation will be brought to a
direction aligned with Western values.


On Post-Modern Networks

2019-11-23 Thread Ryan Carboni
The older networks were not so extractive as the post-modern ones.
Created by weakness, maintained by ignorance, these networks are
demonstrably evil.

It seems trivial to drive by a middle school and test one's guest for
weakness, then invite him to your private island and sell services
(legal ones) at above market value to them. These are comprised of
people who are never satisfied, and never produce anything
satisfactory, much like the rest of post-modernism.

It is extraordinary that no one seems to understand this, yet it
happens so regularly.

It is particularly galling that the people who disempower me and
continually harass me call me or at least insinuate so, that I'm a
control freak. But one must be understanding, these people can't find
their way out of a wet paper bag. It is shocking that these paragons
of moral virtue are no where to be found when it is inconvenient to
them, or when the Nuremberg principles were being violated by the US
government.


US AG Barr: "personally reviewed footage that confirmed no one entered Epstein cell the night he died" - [PEACE]

2019-11-23 Thread Zenaan Harkness
tl;dr from Caitlin Johnstone:

  "It’s a completely unfounded conspiracy theory to believe that
   someone with ties to powerful institutions and individuals might
   be murdered in a way that was made to look like a suicide." 

[with tongue firmly in cheek]


Well that's definitely a wrap folks - since US Attorney General Bill
Bar has personally reviewed the footage of Epstein's cell [which
footage officially does not exist], there's nothing to see but a
massive and systemic sequence of stuff ups - purely cohencidental
folks, nothing to see here, move along please!

  Barr Ends All Conspiracy Theories: Jeffrey Epstein Killed Himself
  In "Perfect Storm Of Screw-Ups"
  
https://www.zerohedge.com/political/barr-ends-all-conspiracy-theories-forever-saying-epstein-died-series-coincidences
  
https://medium.com/@caityjohnstone/barr-says-epstein-died-by-a-series-of-coincidences-ending-all-conspiracy-theories-forever-9ea4c1ec47a0

... Well if reporting that he’s reviewed footage which we were
previously told didn’t exist isn’t enough to dampen those kooky
conspiracy theories, I don’t know what is.

So there you have it. The US government says that an intelligence
asset with damning information on many powerful individuals did
in fact kill himself due to an admittedly bizarre and wildly
unlikely series of strange coincidences. I for one have no more
questions. Checkmate, conspiracy theorists.

  “Mr. Epstein’s death in August at a federal detention center in
   Manhattan set off a rash of unfounded conspiracy theories on
   social media that were picked up and repeated by high-profile
   figures, including Mayor Bill de Blasio and former Mayor
   Rudolph W. Giuliani. No matter their ideology, the refrain of
   the theories was the same: Something did not add up,”
   says The New York Times in its report Barr’s statements.

...



Re: The Cypherpunk's 1995 Archive has been forged, and what are we going to do about it? (was:Re: Could someone add news of Cypherpunks Archive...

2019-11-23 Thread Douglas Lucas
Among the exceptions likely to be cited would be privacy, national
security, ongoing litigation, etc.

On 2019-11-24 03:06, Douglas Lucas wrote:
> Via MuckRock I've filed nearly 100 requests:
> https://www.muckrock.com/accounts/profile/douglaslucas/
> 
> Several of my requests have returned documents, and a few have formed
> the basis of articles by me, e.g this one regarding our gentlehearted
> friends at Stratfor --
> https://web.archive.org/web/20160414073752/https://revolution-news.com/stratfor-wheres-truck/
> -- or this one involving our scholarly friends at the Border Security
> Operations Center in Texas
> https://whowhatwhy.org/2014/07/16/exclusive-the-counterinsurgency-war-on-and-inside-our-borders/
> 
> Because corporations have a few times repeated me in watered down form,
> i.e. because Vice and Salon have published me, echolalia or whatever, I
> usually have success in getting agencies to waive or minimize fees,
> saying the usual stuff about muh journalismszz. Not always though. A
> while back, I asked the Texas state police for certain Stratfor g00dz
> and they wanted a zillion dollars or something.
> 
> In the next 24-48 hours I'm working on a bunch of other FOIA requests,
> including appeals... so I could send requests regarding Cypherpunks off
> as well, if the list clarifies what agencies/offices are wanted.
> 
> Because, what agencies do you suspect might have long ago collections of
> Cypherpunk emails? FOIAs have to go somewhere, to some agency or office.
> Where, Jim and others, were y'all thinking of submitting FOIAs?
> 
> As far as I know, the raw data vacuumed up by federal spy agencies
> haven't and won't be handed out to the public via FOIA. They'll cite any
> one of multiple exceptions. I assume, but do not know for certain, that
> other people have tried such open records requests for laughs, like
> "From the NSA, I hereby request my photos I accidentally deleted back, I
> emailed them to myself 10 years ago, does Joseph Maguire at the ODNI
> have a copy please?"
> 
> It might be good to limit the request to the time frame from and
> including 1 Jan 1995 to and including 31 Dec 1996, because the smaller
> the scope of the request, the slightly less likely it is that the
> gub'ment will delay forever, charge fees, say they don't have anything,
> use some exception, ignore me much like my crushes, etc.
> 
> As I suggested above, I think it would be difficult/impossible to obtain
> cypherpunk emails through FOIA from some agency's covert or clandestine
> or otherwise shady program or other. Agencies usually use exceptions to
> block such requests.
> 
> However, I wonder if there were any overt programs, agencies, offices,
> bureaus, whatever that happened to keep an archive of the cypherpunks
> email list. Maybe some program was liaising with a university for some
> reason regarding computer-y internet-y technical crap. And that program
> housed a bunch of email lists for scientific or advertising or
> educational purposes.
> 
> In other words, don't think spies and covert shit. Maybe there's some
> really overt, goofy program from back then that collected cypherpunks
> emails as part of some straightforward educational or scientific or some
> other mundane thing...?
> 
> Also, regarding to which agencies these open record requests shoudl go,
> don't just limit imagination to the federal government. Many
> agencies/offices/bureaus/etc. at the state, local, county, and other
> levels of government will take open records requests as well.
> 
> Doug
> 
> 
> On 2019-11-22 21:35, jim bell wrote:
>> To Ryan Carboni,
>> It looks like you are familiar with the practice of writing and filing
>> Freedom of Information Act requests. 
>> https://www.muckrock.com/accounts/profile/ryaz/  
>>
>> Given that these requests can take a long time, I think it would be
>> appropriate to make such a filing for any Cyperpunks mailing list
>> emails, especially but not limited to those from 1995-1996.   Naturally,
>> we will want the output on a computer readable format, such as writable
>> CD, writable DVD, or some other downloadable file system.
>>
>>   We will probably want to compare these emails from those that will be
>> obtained by other sources.   What do you think?   Would you help this
>> process?  Can you write the FOIA request?   Thank you.  
>>
>>               Jim Bell
>> e


Re: The Cypherpunk's 1995 Archive has been forged, and what are we going to do about it? (was:Re: Could someone add news of Cypherpunks Archive...

2019-11-23 Thread Douglas Lucas
Via MuckRock I've filed nearly 100 requests:
https://www.muckrock.com/accounts/profile/douglaslucas/

Several of my requests have returned documents, and a few have formed
the basis of articles by me, e.g this one regarding our gentlehearted
friends at Stratfor --
https://web.archive.org/web/20160414073752/https://revolution-news.com/stratfor-wheres-truck/
-- or this one involving our scholarly friends at the Border Security
Operations Center in Texas
https://whowhatwhy.org/2014/07/16/exclusive-the-counterinsurgency-war-on-and-inside-our-borders/

Because corporations have a few times repeated me in watered down form,
i.e. because Vice and Salon have published me, echolalia or whatever, I
usually have success in getting agencies to waive or minimize fees,
saying the usual stuff about muh journalismszz. Not always though. A
while back, I asked the Texas state police for certain Stratfor g00dz
and they wanted a zillion dollars or something.

In the next 24-48 hours I'm working on a bunch of other FOIA requests,
including appeals... so I could send requests regarding Cypherpunks off
as well, if the list clarifies what agencies/offices are wanted.

Because, what agencies do you suspect might have long ago collections of
Cypherpunk emails? FOIAs have to go somewhere, to some agency or office.
Where, Jim and others, were y'all thinking of submitting FOIAs?

As far as I know, the raw data vacuumed up by federal spy agencies
haven't and won't be handed out to the public via FOIA. They'll cite any
one of multiple exceptions. I assume, but do not know for certain, that
other people have tried such open records requests for laughs, like
"From the NSA, I hereby request my photos I accidentally deleted back, I
emailed them to myself 10 years ago, does Joseph Maguire at the ODNI
have a copy please?"

It might be good to limit the request to the time frame from and
including 1 Jan 1995 to and including 31 Dec 1996, because the smaller
the scope of the request, the slightly less likely it is that the
gub'ment will delay forever, charge fees, say they don't have anything,
use some exception, ignore me much like my crushes, etc.

As I suggested above, I think it would be difficult/impossible to obtain
cypherpunk emails through FOIA from some agency's covert or clandestine
or otherwise shady program or other. Agencies usually use exceptions to
block such requests.

However, I wonder if there were any overt programs, agencies, offices,
bureaus, whatever that happened to keep an archive of the cypherpunks
email list. Maybe some program was liaising with a university for some
reason regarding computer-y internet-y technical crap. And that program
housed a bunch of email lists for scientific or advertising or
educational purposes.

In other words, don't think spies and covert shit. Maybe there's some
really overt, goofy program from back then that collected cypherpunks
emails as part of some straightforward educational or scientific or some
other mundane thing...?

Also, regarding to which agencies these open record requests shoudl go,
don't just limit imagination to the federal government. Many
agencies/offices/bureaus/etc. at the state, local, county, and other
levels of government will take open records requests as well.

Doug


On 2019-11-22 21:35, jim bell wrote:
> To Ryan Carboni,
> It looks like you are familiar with the practice of writing and filing
> Freedom of Information Act requests. 
> https://www.muckrock.com/accounts/profile/ryaz/  
> 
> Given that these requests can take a long time, I think it would be
> appropriate to make such a filing for any Cyperpunks mailing list
> emails, especially but not limited to those from 1995-1996.   Naturally,
> we will want the output on a computer readable format, such as writable
> CD, writable DVD, or some other downloadable file system.
> 
>   We will probably want to compare these emails from those that will be
> obtained by other sources.   What do you think?   Would you help this
> process?  Can you write the FOIA request?   Thank you.  
> 
>               Jim Bell
> e


Re: Section 12355 California Legal Code

2019-11-23 Thread Ryan Carboni
I agree, everyone should be allowed access to the necessary arms to
repel oppression.


Obvious political methodology

2019-11-23 Thread Ryan Carboni
When thousands of people in important positions throughout society
think there should be an investigation that would inconvenience the
reigning oligarchs to determine if a crime occurred, there is only two
options:

In a dictatorship, you shoot them.

In a democracy, you would create a slight inconvenience to them to
corroborate evidence and find witnesses.

In economics, people do anticipate outcomes and make decisions based on that.


The Greatest Swindle In American History... And How They'll Try It Again Soon

2019-11-23 Thread Zenaan Harkness
'Member the Fed, muffas:

  The Greatest Swindle In American History... And How They'll Try It
  Again Soon
  
https://www.zerohedge.com/personal-finance/greatest-swindle-american-history-and-how-theyll-try-it-again-soon
  
https://internationalman.com/articles/the-greatest-swindle-in-american-history-and-how-they-will-try-it-again-soon/

International Man: Before 1913 there was no income tax, and the
United States was a much freer country. Initially, the government
sold the federal income tax to the American people as something
only the rich would have to pay.

Jeff Thomas: Yes, exactly. It always begins this way. The average
person is always happy to see the rich taken down a peg, so this
makes the introduction of the concept of theft by the government
more palatable. Once people have gotten used to the concept and
accept it as being perfectly reasonable, then it’s time to begin
to drop the bar as to who “the rich” are. Ultimately, the middle
class are always the real target.

International Man: The top bracket in 1913 kicked in at $500,000
(equivalent to around $12 million today), and the tax rate for it
was only 7%. The government taxed those making up to $20,000
(equivalent to around $475,000 today) at only 1% – that’s one
percent.

Jeff Thomas: Any good politician understands that you begin with
the thin end of the wedge, then expand upon that as soon as you
feel you can get away with it. The speed at which the tax rises
is commensurate with the level of tolerance of the people. And in
different eras, the same nation may have a different mindset. The
more domination a people have come to accept from their
government, the faster the pillaging can be expanded.

As an example, the Stamp Tax that King George III placed upon the
American colonies in the eighteenth century was very small indeed
– less than two percent – but the colonists were very independent
people, asking little from the king in the way of assistance, and
instead, relying upon themselves for their well-being. Such
self-reliant people tend to be very touchy as regards
confiscations by governments, and even two percent was more than
they would tolerate.

By comparison, if today, say, Texas were to eliminate all state
taxation and allow only two percent in federal taxation,
Washington would come down on them like a ton of bricks, saying
they were attempting to become a “tax haven.” They’d be accused
of money laundering and aiding terrorism and might well be cut
out of the SWIFT system. The federal government would shut down
the state government if necessary, but diminished tax would not
be tolerated.

International Man: Of course, once the American people conceded
the principle of an income tax in 1913, the politicians naturally
couldn’t resist ramping it up. Just look at the monstrosity that
exists today in the US tax code, which most Americans passively
accept as “normal.” It’s a typical example of giving an inch and
taking a mile.
...


Also, a whole bunch of factual JFK stuff out recently, for those who
missed what he was about:

  Remembering JFK's Vision For The Future That Should Have Been
  
https://www.zerohedge.com/political/remembering-jfks-vision-future-should-have-been
  
https://www.strategic-culture.org/news/2019/11/22/remembering-john-f-kennedys-vision-for-the-future-that-should-have-been/

“Man holds in his mortal hands the power to abolish all forms
 of human poverty and all forms of human life. And yet the
 same revolutionary beliefs for which our forebears fought are
 still at issue around the globe….”
President Kennedy, 1961 Inaugural Address

...


  JFK: What The CIA Hides
  https://www.zerohedge.com/geopolitical/jfk-what-cia-hides
  https://www.counterpunch.org/2019/11/22/jfk-what-the-cia-hides/

... Yet the files remain off-limits to the public. Thanks to the
legal consensus, articulated by Justices Kavanaugh and Breyer,
the CIA enjoys “deference upon deference” when it comes to the
JFK assassination story. As a result, the JFK Records Act has
been flouted. The public’s interest in full disclosure has been
thwarted.
...




On Sat, Nov 09, 2019 at 08:30:55PM +1100, Zenaan Harkness wrote:
> I do know folks round these parts NEVER let this one sneaky little
> ditty dominate their groove, so just pretend it's NOT set to some
> skank tune about sex:
> 
>   Let's talk about blame, ba-by, let's talk about U I B,
>   Let's talk about all the good gold and the bad fiats, we can see,
>   Let's talk a-bout Fed!
> 
> You know, we need to upgrade the subwoofer where I's stayin' bruh -
> need one o' them big megawatters which are sooo powerful you gotta
> bolt 'em to the floor and add reinforcements to the walls - so
> please, donations already! :)
> 
> 
> Alright, so where were we - sex or so

Re: Tor Stinks re Traffic Analysis and Sybil (as do other networks)

2019-11-23 Thread Mirimir
On 11/23/2019 04:23 PM, Punk-Stasi 2.0 wrote:
> On Sat, 23 Nov 2019 15:39:55 -0700
> Mirimir  wrote:
> 
>>
>> The villains here are writers of the Tor Project website. They bullshit
>> users, overselling Tor. Why, I don't know. Maybe it's all a honeypot. Or
>> maybe they're just idiots.
> 
>   Notice that they get paid as long as tor exists. So even if tor was not 
> a honeypot, and they are not idiots, they still have a fundamental incentive 
> to oversell it. Their paychecks.

Yeah, good point.

After those FOIA documents came out, I lost all respect for the Tor
Project. I get how conflicted they were. Needing government support.
Keeping the cops happy. Maybe having their jobs threatened. But selling
out is selling out, no matter how many excuses one has.

>   Also, syverson and co. are complicit in overselling tor, despite the 
> fact that their papers for the 'technical intelligentsia' spell out the 
> limitations. 

Agreed.

>> I've wondered whether it's just that they need lots of users for cover
>> traffic. That _was_ a major factor in opening Tor to the public, instead
>> of restricting it to government users. But that seems unlikely, now,
>> given that the NSA etc could easily run enough bots on hacked servers.
> 
> 
>   My guess is that the main reason for them to get as many users as they 
> can is to justify funding. Hell, maybe they even get a percentage of funding 
> directly proportional to number of users/network size.

Makes sense.


Re: Tor Stinks re Traffic Analysis and Sybil (as do other networks)

2019-11-23 Thread Mirimir
On 11/23/2019 10:00 AM, Punk-Stasi 2.0 wrote:
> On Sat, 23 Nov 2019 03:21:08 -0500
> grarpamp  wrote:
> 
>>
>>> low-latency
>>
>> This phrase is misused by many as if it were some kind
>> of litmus test for determining TA resistance... it is not.
> 
>   by 'low latency' they mean two things :
> 
>   1) 'efficient' use of data transmission capacity, i.e. whether chaff is 
> sent(expensive)  or not.
>   
>   2) actual low latency. In order to prevent timing attacks, packets need 
> to be reclocked, which means adding delay, which results in higher 'latency'.
> 
>   So anyway, 'low latency' is shorthand for systems that don't do any of 
> the above, and oo are...shit. And tor is included in the shit cateory. And 
> scum-master syverson openly acknowledges it...in papers that no-one reads, 
> while advertising tor as a means to 
> 
>   "Defend yourself against network surveillance and traffic analysis." 
> 
>   which is of course outright criminal fraud. 

Yes, Tor is low-latency. And is vulnerable to traffic analysis. And yet,
as you say, it's promoted to the clueless as resisting "network
surveillance and traffic analysis".

Which is, as you say, "outright criminal fraud".

Even so, if you read the Tor design document

you see that they're quite open about the limitations.

And so are Syverson's publications, which you've quoted a lot.

The villains here are writers of the Tor Project website. They bullshit
users, overselling Tor. Why, I don't know. Maybe it's all a honeypot. Or
maybe they're just idiots.

I've wondered whether it's just that they need lots of users for cover
traffic. That _was_ a major factor in opening Tor to the public, instead
of restricting it to government users. But that seems unlikely, now,
given that the NSA etc could easily run enough bots on hacked servers.


Re: Tor Stinks re Traffic Analysis and Sybil (as do other networks)

2019-11-23 Thread Peter Fairbrother

On 23/11/2019 17:00, Punk-Stasi 2.0 wrote:

On Sat, 23 Nov 2019 03:21:08 -0500
grarpamp  wrote:




low-latency


This phrase is misused by many as if it were some kind
of litmus test for determining TA resistance... it is not.


by 'low latency' they mean two things :


No, neither of those. Low latency simply means messages get delivered 
quickly - in practice for web browsing this means a user gets a 
(subsequent) response within 4 or 5 seconds, though less than 1 second 
is better.


Initially that timing was a guess, but since then there have been 
several papers which conclude that if web response time is consistently 
longer than 4-5 seconds then people will give up and seek a faster 
response by eg using different software. After 1 second you begin to 
lose your train of thought. After 4-5 you get bored. There is another 
threshold of boredom at about 10-12 seconds.



Eighth law: a system which is hard to use will be abused or unused.


The Tor rationale for requiring low latency was to make it more 
user-friendly and also thereby increase (innocent) traffic. 
Unfortunately that came at the cost of easier traffic analysis, as only 
the traffic passed within the last 4-5 seconds need be considered. They 
tried to balance that out - more traffic plus greater usability vs 
easier analysis - and came up with a system which had some 
perhaps-useful properties.


However, resistance against traffic analysis by The Man was not one of 
those properties.


And for that exact reason I agree, Tor stinks.

Most if not all of the initial devs would have liked it to be, but that 
wasn't possible.  Roger Dingledene did the initial brainstorming with 
the informal help of much of the then privacy/anonymity crypto 
community, including Paul. Nick Matthewson was then roped in as the main 
code writer.


It was quickly realised that Tor - like any low-latency web onion router 
- could not defeat The Man, at which point many of the community dropped 
out or declined to be associated with it.



And scum-master syverson

At the time of Tor's inception (and afaik still) Paul primarily 
identified as US Navy.


I don't know whether Paul would have worked on a public system which was 
impervious to NSA and USN - but the question never arose. Tor would be 
good enough to defeat third-world governments, which was both his and 
Tor's stated goal, and Tor could never defeat The Man.



openly acknowledges it...in papers that no-one reads, while advertising 
tor as a means to


"Defend yourself against network surveillance and traffic analysis."


Is that a quote from Paul? It doesn't sound like the chap I knew. Who 
wasn't a scum-master, except perhaps to the swabbies?


Heck, Roger and Nick were wanna-be-heroes.




Peter Fairbrother



Re: PC Gamer: This computer is 26 inches tall and houses a 400,000-core processor

2019-11-23 Thread Steven Schear
Would love to see Gnu Radio running on this.

On Sat, Nov 23, 2019, 9:37 AM jim bell  wrote:

> PC Gamer: This computer is 26 inches tall and houses a 400,000-core 
> processor.https://www.pcgamer.com/this-computer-is-26-inches-tall-and-houses-a-40-core-processor/
>
>
>
>


Re: Section 12355 California Legal Code

2019-11-23 Thread rooty
https://www.north-korea-travel.com/kumgangsan.html

Kumgangsan

Meaning Diamond Mountain, Kumgangsan is located on the east coast of North 
Korea. Consisting of protruding rock formations, steep cliffs, waterfalls, 
valleys and natural pools, this area is ideal for spooks, lovers and hiking 
enthusiasts.

 Original Message 
On Nov 22, 2019, 11:16 PM, Ryan Carboni wrote:

> (a) Except as provided in Chapter 2.5 (commencing with Section 12301),
> any person who assembles, maintains, places, or causes to be placed a
> boobytrap device as described in subdivision (c) is guilty of a felony
> punishable by imprisonment in the state prison for two, three, or five
> years.

Cryptocurrency: DEX vs Censorship of Arbitrary Rule, Morocco Positions

2019-11-23 Thread grarpamp
https://old.reddit.com/r/Bitcoin/comments/e0bz2v/this_is_not_what_crypto_is_about_we_need_to_fund/
https://i.redd.it/rcvfaro3pc041.jpg

samdane
"This is not what crypto is about. We need to fund as much DEX
development as humanly possible. This issue is going to get worse and
worse until we do. Please dear God, read the fine print.
This 'mentality' disguised as 'national security' is whole sale
neocolonial, racist, oppressive domineering predominantly against the
global south, or just generally any smaller struggling country to
'punch down'. It's such overt imperialism it's hard to call it by any
other name. And you know the shit kicker? I screen shotted this from a
"DEX" well I got news for you folks, it ain't a real DEX if it
requires a ToS like this. ... I'm not going to shut up about FATF,
because this is what FATF is about. Andreas doesn't agree with this.
Cypherpunk doesn't agree with this. How can the crypto community
possible be pro FATF? This is not what bitcoin was made for. FATF is
imperialism."



See also...

BlockDX
BISQ
OpenBazaar
McAfeeDEX
P2P

etc...



https://blocknewsafrica.com/morocco-central-bank-governor-calls-blockchain-disruptive/

Country well known for torture positions it's centralized bank self
nearer centralized coin torture community with blockchain speak.


Internet Utopias Survey and Manifesto

2019-11-23 Thread grarpamp
Fri, Nov 22, 2019
Reply-To: christian.fu...@uti.at

As part of an AHRC research network, I conduct a survey about
Internet/media utopias.

In the time of the Cambridge Analytica scandal and fake news, we
experience a crisis of Internet platforms. Many people think we need
Internet and media utopias today. But how could they look like?
Those interested in liberation and technology might have good ideas...
I therefore want to invite you to participate:

https://psmutopias.limequery.net/879161

Answering will take about five minutes. A number of participants with
very visionary ideas will be invited to a workshop in 2020 in London,
where participants will work on co-writing/co-authoring an
Internet/Media Utopias Manifesto.

Kind regards, Christian Fuchs

-- 
Prof. Christian Fuchs
University of Westminster,
Director of the Communication and Media Research Institute
http://www.camri.ac.uk
@fuchschristian
c.fu...@westminster.ac.uk


Re: Section 12355 California Legal Code

2019-11-23 Thread grarpamp
> As far as I can see, this is a clear violation of the Second Amendment.  I
> believe that a proper definition of "arms" is "objects used as weapons".
> While the description of subdivision "c" is not included here, a "boobytrap
> device" certainly would qualify as an "arm":  It is used as a weapon.  The
> principle of the 2008 Heller decision and 2010 McDonald v. Chicago decision
> is that restrictions that didn't exist when the 2nd Amendment was ratified
> (1791) are literally "infringements".


The OP lacks links and their section nums are old.
Text search all sections here for "boobytrap"...

https://leginfo.legislature.ca.gov/faces/home.xhtml


Related...

https://old.reddit.com/r/legaladvice/comments/3arcz6/california_can_i_booby_trap_my_car/

These sorts of objects laws seem bogus, otherwise
they would ban hammers, rocks, sticks, cars, fists,
tuna salad, and nukes, from everyone, including themselves.

Whether fist or nuke, someone either rightly self-defended,
or wrongly aggressed causing some range from injury to
death, or they didn't, end of story, no.

Then the often fun question of whether you can use your
booby objects while away, to defend against theft of your other
kitchen objects by a thug who wants to use them against
someone else, or even just to sell or covet them. Instead of
say needing to man your place with your fists 24x7 (which
in places just as crazy as CA [1] you probably can't do to
protect your stuff either).

[1] aka Razer's commie commune, jk :)


PC Gamer: This computer is 26 inches tall and houses a 400,000-core processor

2019-11-23 Thread jim bell
PC Gamer: This computer is 26 inches tall and houses a 400,000-core processor.
https://www.pcgamer.com/this-computer-is-26-inches-tall-and-houses-a-40-core-processor/



Re: Section 12355 California Legal Code

2019-11-23 Thread jim bell
 On Friday, November 22, 2019, 11:18:42 PM PST, Ryan Carboni  
wrote:
 
 >(a) Except as provided in Chapter 2.5 (commencing with Section 12301),
any person who assembles, maintains, places, or causes to be placed a
boobytrap device as described in subdivision (c) is guilty of a felony
punishable by imprisonment in the state prison for two, three, or five
years.


As far as I can see, this is a clear violation of the Second Amendment.  I 
believe that a proper definition of "arms" is "objects used as weapons".  While 
the description of subdivision "c" is not included here, a "boobytrap device" 
certainly would qualify as an "arm":  It is used as a weapon.  The principle of 
the 2008 Heller decision and 2010 McDonald v. Chicago decision is that 
restrictions that didn't exist when the 2nd Amendment was ratified (1791) are 
literally "infringements". 
          Jim Bell  

Tor Stinks re Traffic Analysis and Sybil (as do other networks)

2019-11-23 Thread grarpamp
> recommend utilizing Tor to combat government surveillance

If users adversaries operate under whichever governments
classification levels such as TOP SECRET FVEY, and especially
if the users are doing something that such govts would take
personal affront to, such users need to do some serious thinking.

> low-latency

This phrase is misused by many as if it were some kind
of litmus test for determining TA resistance... it is not.
It's likely possible to create a LL network that traffic analysis
cannot penetrate even with every single link tapped.
Latency, purely by itself, does not define whether
or not a network is secure against traffic analysis.
Latency (whatever level therein) really refers to
the useability different categories of apps would
have at such level... the user experience.

> "All ... systems as currently designed and deployed are essentially
> broken against The Man"

Surely generally true by now. Tor's nearly 25 year old design
since inception is nothing more than a bunch of free proxies
that users chain through (same as VPN's). Perhaps a
bit better than VPN by maybe weighting traffic towards busy,
plus an assortment of other things, and some more worse than
VPN due to obvious simplicity of infesting the network with a
nasty case of Sybil to the tune of 100+ nodes a month in
some months. Luckily the dumb ones are caught, but it's
not those that users should worry about.

Like VPN, Tor is good at giving users a different IP that the everyday
world of civilian / commercial endpoints has a hard time tracing.

But hardly so good at resisting what Govt's and GigaCorps
can now analyze and attack. Even independant smalltime
researchers are confirming TA and Sybil methods against
Tor and many other overlay networks.

As to the *PA's listed before, they've had the thought,
vantage, access, coordination, tech, money, etc
to TA, and certainly to Sybil, just about any overlay
network since about the time such networks came
into being. 1995 2000 2005 and if by 2010 and Snowden
people weren't assessing that capability exists, even
based only on opensource research, well pity the fool.

TA, Sybil, *PA's, GT-1's etc are no longer just some sidebar
caveats in highbrow whitepapers to be dismissed and buried.

There needs to be new networks deployed that take
those as their top design considerations over all others.

> https://www.schneier.com/blog/

Schneier seems much more a friend of govcorp (ie Counterpane),
and a generic blogwonk, than any sort of genuine users activist
taking any sort of strongly voiced principled stand on anything
that matters.

As Chiefs on Tor Board one might look for Schneier and Blaze
to be publicly saying and doing some project, Tor or other,
regarding TA, Sybil, or even disproving them if they weren't real
threats, or at least something... instead Tor and other nets
are often crickets on that. (Old congressional testimonies are
also oldsauce, stir up some new hot chili.)

Note also that Tor doesn't need to actually care about its users
security to play whatever legal test and game in the courts
that it and it's lawyers are lined up waiting to play (remember
Tor was tied with EFF for many years for various reasons).
How are users to be indemnified by anyone, if not first by
themselves using the security of a network itself, and if
the network is not capable, then what.

Regardless of whether Tor etc is good or bad or none
of the above, holding a near monopoly in the space
on cashflow, legal, steering tech, discourse, twatterverse
populism, etc... for ~10-15 years... is not good situation.

Competition is healthy. And while the design of today's
networks is largely unchangeable by nature of being deployed,
their adversaries are adapting to leverage clearly whitepapered
weaknesses in those designs since years.

New networks... from internet overlay, fiber, radio,
carrier pigeon, dropgangs... need to be researched,
coded, and deployed by new players.


Anyway, have some traffic noise generators...

http://trackmenot.io/
https://adnauseam.io/